Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Virtual Private Networks
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Virtual Private Network
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Network (VPN) SCSC 455

VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists as a virtual entity within a public network – It is private because it is confined to a set of private users

Private Networks vs. Virtual Private Networks Employees can access the network (Intranet) from remote locations. Secured networks. The Internet is used as the backbone for VPNs Saves cost tremendously from reduction of equipment and maintenance costs. Scalability

Why is it a Virtual Private Network? From the user’s perspective, it appears as a network consisting of dedicated network links – These links appear as if they are reserved for the VPN client – Because of encryption, the network appears to be private

Typical VPN Connection

Tunnel and Connections Tunnel – The portion of the network where the data is encapsulated Connection – The portion of the network where the data is encrypted

Application Areas In general, provide users with connection to the corporate network regardless of their location The alternative of using truly dedicated lines for a private network are expensive propositions

Some Common Uses of VPN Provide users with secured remote access over the Internet to corporate resources Connect two computer networks securely over the Internet – Example: Connect a branch office network to the network in the head office Secure part of a corporate network for security and confidentiality purpose

Remote Access Over the Internet

Connecting Two Computer Networks Securely

Basic VPN Requirements User Authentication – VPN must be able to verify user authentication and allow only authorized users to access the network Address Management – Assign addresses to clients and ensure that private addresses are kept private on the VPN Data Encryption – Encrypt and decrypt the data to ensure that others on the not have access to the data Key Management – Keys must be generated and refreshed for encryption at the server and the client Multi-protocol Support – The VPN technology must support commons protocols on the Internet such as IP, IPX etc.

VPN Implementation Protocols Point-to-Point Tunneling Protocol (PPTP) of Layer 2 Tunneling Protocol (L2TP) IPSec

More on Tunneling Tunneling involves the encapsulation, transmission and decapsulation of data packets The data is encapsulated with additional headers The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel

Tunneling

Point-to-Point Tunneling Protocol (PPTP) Encapsulate and encrypt the data to be sent over a corporate or public IP network

Level 2 Tunneling Protocol Encrypted and encapsulated to be sent over a communication links that support user datagram mode of transmission – Examples of links include X.25, Frame Relay and ATM

IPSec Tunnel Mode Encapsulate and encrypt in an IP header for transmission over an IP network

Layer 2 Tunneling Protocols PPTP L2TP Both encapsulate the payload in a PPP frame

Layer 3 Tunneling Protocol IPSec Tunneling Mode – Encapsulates the payload in an additional IP header

Other Important Protocols in VPN Microsoft Point-to-Point Encryption (MPPE) Extensible Authentication Protocol (EAP) Remote Authentication Dial-in User Service (RADIUS)

Some Example Scenarios VPN remote access for employees. On-demand branch office access. Persistent branch office access. Extranet for business partners. Dial-up and VPNs with RADIUS authentication

Router-to-Router Branch Office Connection

VPN Based Extranet

Dial-up and VPNS with RADIUS Authentication